Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How to SSH into Docker containers

A Docker container is a portable software package that holds an application’s code, necessary dependencies, and environment settings in a lightweight, standalone, and easily runnable form. When running an application in Docker, you might need to perform some analysis or troubleshooting to diagnose and fix errors. Rather than recreating the environment and testing it separately, it is often easier to SSH into the Docker container to check on its health.

Demo: How to Find, Fix and Prioritize Healthcare Device Threats

Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.

Implementing Backstage 1: Getting Started

Backstage is a platform for building developer portals. Originally developed internally at Spotify, it’s now open source and available through GitHub. Backstage allows DevOps teams to create a single-source, centralized web application for sharing and finding software (through the software catalog feature), as well as templates and documentation.

Executive Summary with Jeff Abbott, Episode 2: Forcing a Condor Moment, feat. Joel Fulton, Co-Fo...

Ivanti’s research into cybersecurity preparedness found that more than half of security professionals consider phishing, ransomware and software vulnerabilities to be the most important threats they face – but that likewise more than half of security professionals considered themselves well-prepared to deal with those threats.

Evaluating the Security of Your Messaging Platform

Mobile messaging and Voice over Internet Protocol (VoIP) applications have revolutionized communication, providing free and convenient alternatives to traditional cellular network services. These apps have gained immense popularity, connecting millions of users worldwide. However, as we embrace the convenience, we must also be aware of the cybersecurity risks associated with these platforms.

Eight Cybersecurity Tips for Businesses in 2023

The online playing field for businesses in multiple niches has expanded, with the internet enjoying an overarching presence in various facets. New and larger markets have become more accessible through online platforms. All an established business needs is computer-based tools and an internet connection that won’t falter. Expansion is often rewarding but has its fair share of risks; thus, melding a nice blend of cybersecurity with a growing company is the safe way to go about it.

Rootless Containers - A Comprehensive Guide

Containers have gained significant popularity due to their ability to isolate applications from the diverse computing environments they operate in. They offer developers a streamlined approach, enabling them to concentrate on the core application logic and its associated dependencies, all encapsulated within a unified unit.